I’ve had it! It is the second time that a “hacker” (A hacker or should I say thief) has had access to my Ubuntu 14.04 LTS system.
The person that I suspect has had physical access to my pc because he ...

I am writing a novel in which a researcher attempts to work against a study he is a part of by purposely sabotaging operations on the research compound. I am wondering if the following is plausible.
...

We have created an amateur software product related with monitoring and management of specific services. It has been made in Python and runs a web service as frontend to show the data in a nice way ...

I have an enterprise application running that uses both MySQL and Mongodb datastores. My development team all have ssh access to the machine in order to perform application releases, maintenance etc. ...

All in all, hardware keyloggers are harder to detect.
But if computers can measure the exact voltage consumption of their peripherals, could a hardware keylogger be detected by comparing the normal ...

I am a newbie to data security and would like to ask few questions related to Google Mail and Google Drive. What I want to know is how these two apps could be used to access a company's network AND ...

I have never worked in big organization and I wonder if any of them considers food or drinks a security threat. More than one movie showed the scenario of an operator who accidentally spills tea on ...

Yesterday my friends Samsung Galaxy S3 was stolen. We have found the perpetrator but cannot yet prove anything. He is uploading photos to social media via the phone. Is there any chance to download ...

In our company we have a procedure to verify internal worker but we cannot use it for temporary worker. We cannot use badges and because of privacy reasons we cannot use any photos. Is there any other ...

What I mean by public device?
E.g. in Germany we have small stations to charge cars powered by electricity. This stations are small towers with a flap. Behind the flap are plugs to connect the tower ...

A Yahoo! answers user suggested that there are 5^5 possible unique configurations for a physical key, but the answer wasn't sourced. I wondered if anyone had similar numbers for how many possible key ...

My lecturer said that since hard disk space is so cheap these days, most organisations do not delete the data on the disk. Rather, they only logically delete it (remove the link to the data). If this ...

I am buying a new Thinkpad with an in-built GPS/Cellular modem. I am thinking what are the best practices for making the notebook secure in case of theft. I am planning to do full disk encryption and ...

I have a server which has 'loose' physical security (somewhat easy for the entire server to get stolen).
For the sake of the question, let's assume that anyone can access the server physically, what ...

I'm studying security in computers and in particular the URL Spoofing. I understand that a form of URL spoofing is phishing. Then I read that a countermeasure against phishing is the authentication ...

If I am working writing a text document in a text editor (say notepad or MS word, or ...) then I can save the file and the encrypt this file. I can then try to erase the original file by overwriting ...

I have a DMS system(alfresco) that needs to sign approx 50.000 valid signatures a year.
The signing certificate needs to be acquired from one of the affiliated sub-CA's.
So according to the Adobe CDS ...

I am to release a system-on-chip device that, during its lifetime, will come to store sensitive data. I want to make that data hard to extract or duplicate.
Encrypting is good for dealing with MiTM, ...

I've been researching into some methods to ensure that disk encryption keys can't be stolen, and one that I've come across is called TRESOR. With this kernel patch, you can create a partition that is ...

Say you have a windows server that works as a PDC AD box. Is this a potential Attack Vector for a small 20 people buisness? Wouldn't it be better to simply have an encrypted database file with all the ...